Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-3563

Опубликовано: 08 дек. 2009
Источник: redhat
CVSS2: 5
EPSS Высокий

Описание

ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=531213ntpd: DoS with mode 7 packets (VU#568372)

EPSS

Процентиль: 99%
0.85119
Высокий

5 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.

nvd
больше 15 лет назад

ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.

debian
больше 15 лет назад

ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote ...

github
около 3 лет назад

ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.

oracle-oval
больше 15 лет назад

ELSA-2009-1648: ntp security update (MODERATE)

EPSS

Процентиль: 99%
0.85119
Высокий

5 Medium

CVSS2